Quiz 12 Flashcards
(10 cards)
Which of the following are examples of cloud computing service models?
Business as a Service
Software as a Service
Utility as a Service
Infrastructure as a Service
Software as a Service
Infrastructure as a Service
A service model which makes it possible for customers to rent virtual machines in the cloud is known as:
Software as a service
Utility as a service
Platform as a service
Infrastructure as a service
Infrastructure as a service
Some of the resources that can be provisioned on demand for customers in the cloud environment includes
Network
Memory
Storage
Laptop
Network
Memory
Storage
A load balancing technique where servers are selected one by one without any consideration to serve incoming requests is known as
Low latency
Least connections
Weighted round robin
Round robin
Round robin
Virtual machines can be migrated from one host to another in a cloud environment
False
True
True
Which of the following cryptographic schemes can protect against spoofing
Hashing
Asymmetric encryption
Digital signature
Digital signature
Alice would like to digitally sign a message to be sent to Bob. What key should she use?
Alice’s private key
Alice’s public key
Bob’s public key
Bob’s private key
Alice’s private key
Bob received a digitally signed message from Alice. What key should he use to verify the message?
Bob’s public key
Alice’s private key
Bob’s private key
Alice’s public key
Alice’s public key
Bob would like to encrypt a message to be sent to Alice. What key should he use?
Bob’s public key
Alice’s public key
Alice’s private key
Bob’s private key
Alice’s public key
Man-in-the-middle attack can be alleviated by using:
Hashing
Public key
Certificate
Digital signature
Certificate